7.1
CVSSv2

CVE-2018-16831

Published: 11/09/2018 Updated: 16/11/2018
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 632
Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N

Vulnerability Summary

Smarty prior to 3.1.33-dev-4 allows malicious users to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

smarty smarty

Vendor Advisories

Debian Bug report logs - #908698 smarty3: CVE-2018-16831 Package: src:smarty3; Maintainer for src:smarty3 is Mike Gabriel <sunweaver@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 12 Sep 2018 19:39:01 UTC Severity: important Tags: security, upstream Found in versions smarty3/3131+201 ...
Several security issues were fixed in Smarty ...